SlideShare a Scribd company logo
1 of 63
Project Management Methodology in Security Projects Deter - Detect - Delay - Deny 1 John N. Motlagh, MBA
Project management history Project management defined Team dynamics Project management mechanics Project manager qualities Project estimating Contracting Risk assessment Financials Deter - Detect - Delay - Deny 2 Agenda
“A project is a temporary endeavor undertaken to create a unique product or service” PMBOK 2001 “Any undertaking that has a definite, final objective representing specified values to be used to satisfy some need or desire”. Cleland Deter - Detect - Delay - Deny 3 Project Defined
Project Management is the application of knowledge, skills, tools and techniques to meet project objectives. PMBOK 2001 Deter - Detect - Delay - Deny 4 Project Management Defined
Kerzner believes successful project management will yield the following: Projects completed within the allotted time and budget Systems having  the desired performance level Assigned resources are used effectively and efficiently Customer acceptance Deter - Detect - Delay - Deny 5 Project Management Defined
“A program is a group of projects managed in a coordinated way to obtain benefits not available from managing them separately.” PMBOK 2001 “Operations are ongoing work, similar to programs, with a reduced sense of benefit.” Kerzner Deter - Detect - Delay - Deny 6 Programs and Operation
Deter - Detect - Delay - Deny 7 What is the PMBOK?
Integration	 Scope	 Time Cost	 Quality Procurement Communication Risk 	 Human Resources Deter - Detect - Delay - Deny 8 PMBOK Knowledge Areas
Initiation	 Planning Execution	 Control Close Deter - Detect - Delay - Deny 9 PMBOK Process Groups
Deter - Detect - Delay - Deny 10 How do Knowledge Areas and Process Groups map?
Definitions History Dashboard Deter - Detect - Delay - Deny 11 Project management fundamentals
Temporary Limited time frame Definite beginning and end End is when the objectives are met or,  It is clear that the objectives cannot be met Unique Something that has not been done before May be unique even if the category it belongs to is large Deter - Detect - Delay - Deny 12 Project management definitions
Developing a new fighter jet Bringing a new drug to market Installing a security system Programming a DVR Deter - Detect - Delay - Deny 13 Project definitions
Time Processes required to ensure timely completion of the project Cost Processes required to ensure the project is completed within budget Quality Includes all the process required to ensure the project will satisfy the needs for which it was undertaken Deter - Detect - Delay - Deny 14 Project definitions
Activity definition Activity sequencing Activity duration estimating Schedule development Schedule control Deter - Detect - Delay - Deny 15 Time
Resource planning Cost estimating Cost budgeting Cost control Deter - Detect - Delay - Deny 16 Cost
Quality planning Quality assurance Quality control Deter - Detect - Delay - Deny 17 Quality
Project manager Management team Subcontractors Sales team Consultants  Customers Deter - Detect - Delay - Deny 18 Stakeholders
An MS Project gantt chart is not a WBS Base line planning document If it is not in the WBS it is not in scope Deter - Detect - Delay - Deny 19 Work breakdown structure
Time oriented display of activity Activity along the left Calendar along the top Duration represented by bars Deter - Detect - Delay - Deny 20 Gantt or Bar chart
Critical path method (CPM) Used to predict project duration Analyze the activities with the least amount of scheduling flexibility Late start Early finish Deter - Detect - Delay - Deny 21 Network diagram
PERT Statistical estimating Optimistic Most likely Pessimistic Deter - Detect - Delay - Deny 22
No shortage of literature on team dynamics The Joiner Team Handbook is the best there out there  Deter - Detect - Delay - Deny 23 Managing the project team
Team building stages Forming Feelings Behaviors Storming Norming Performing Recipe for a successful team Clear goals Continuous improvement Clear roles Clear communication Beneficial team behaviors Well defined decision process Established ground rules Awareness of group process Use scientific approach Deter - Detect - Delay - Deny 24 Highlights from the Team Handbook
Deter - Detect - Delay - Deny 25 Break?
Late 1800’s Faced with large projects Unprecedented amounts of raw materials Managing 1000’s of laborers Transcontinental railroad Deter - Detect - Delay - Deny 26 Project management history
Early 1900’s Demand for harder and longer hours from workers force science of efficiency WWI, New deal projects Gantt chart developed around 1900 PM unchanged for almost 100 years Deter - Detect - Delay - Deny 27 Project management history
Late 1900’s WWII Shrinking war time labor New organization  Pert chart Critical Path Methodology (CPM) Highly complex projects for military, industrial, construction Deter - Detect - Delay - Deny 28 Project management history
Today Internet based systems Global resources working in real time Deter - Detect - Delay - Deny 29 Project management history
Pre-sales Defining phase Planning phase Implementation phase Closing phase Deter - Detect - Delay - Deny 30 Phase breakdown
Divided into unique phases, starts after sales cycle is complete Deter - Detect - Delay - Deny 31 Security specific project management Defining Planning Closing Implementing
Defining Get organized Review the contract Interview sales and customer Prepare a riser diagram Update the BOM Assume control of cash flow and cost Hold kick off meeting Deter - Detect - Delay - Deny 32 Project dashboard checklist Planning ,[object Object]
Work breakdown schedule
Cost Re-Estimate
Critical path
Project scheduleImplementation ,[object Object]
Documentation tools
Procurement
Manage the field workClosing ,[object Object]
As built drawing
Final security testing
Final acceptance
Warranty
Service turnover
Project audit,[object Object]
Kick off meeting action itemsImplementation ,[object Object]
Daily onsite project controls
Weekly onsite documentationClosing ,[object Object]
Project closeout
Ops to service turnover,[object Object]
Manage design process Manage costs Balance activities Ensure customer satisfaction Project scope Project costs Project schedule Not price Deter - Detect - Delay - Deny 35 Responsibilities
Understand and interpret the scope of work to the project team Continually validate scope with customers Continually search for ways to reduce costs Plan project phases and tasks Manage cash flow Coordinate sub-contractors Communicate to the stakeholders Deter - Detect - Delay - Deny 36 Tactical tasks
Project leader Administrator Coordinator Politician Advocate  for the firm  and the customer ? Deter - Detect - Delay - Deny 37 Qualities of a Project Manager
The project manager is responsible for  Project definition Project planning Project implementation Project closing The PM must make sure the project is  On time Within budget Within scope, and  Meets customer expectations Deter - Detect - Delay - Deny 38 Project manager summary
Security equipment specifications Tools and techniques Risks associated with estimating Inputs to an accurate estimate Deter - Detect - Delay - Deny 39 Estimate security projects
Removed from electric subsystem Now they are considered under Division 28 Deter - Detect - Delay - Deny 40 Specifications
Order of magnitude Expert judgment -25% to +75% Parametric modeling Cost /sq ft, budgetary -10% to +25% Bottom up Cost of individual items -5% to +10% Unit price -5% to +5% Deter - Detect - Delay - Deny 41 Cost estimating techniques
Scope Loosely defined scope No specs Poor requirements Time Rushed timeline Unanticipated overtime Quality Customer asks for work beyond scope without change order Other Legislative requirements Might change during project Deter - Detect - Delay - Deny 42 What can affect your estimates?
“Make it up on the next job” Poor scope interpretation Inaccurate WBS Rework Optimistic schedule ? Deter - Detect - Delay - Deny 43 Estimating risks
Work breakdown structure Resource requirements Resource rates Activity durations Historical information Deter - Detect - Delay - Deny 44 Estimating inputs
List resources required for each WBS item Need resource quantity Need resource cost Resource types Equipment Labor Subs Special tools Deter - Detect - Delay - Deny 45 Resource requirements
Unit price for each resource Consider using burdened labor rate Deter - Detect - Delay - Deny 46 Resource rates
Use standard labor for installation NECA manual Man hours 16 man hours = 2 techs for 1 day Deter - Detect - Delay - Deny 47 Activity duration

More Related Content

What's hot

Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Narudom Roongsiriwong, CISSP
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301PECB
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRCorporater
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security EngineeringSam Bowne
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss PreventionReza Kopaee
 
Telecom Performance Management System: Overview
Telecom Performance Management System: OverviewTelecom Performance Management System: Overview
Telecom Performance Management System: OverviewPavel Lechenko
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraIGN MANTRA
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through CorrelationAnton Chuvakin
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level AgreementKHNOG
 
How to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsHow to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsMontrium
 
Network operation center
Network operation centerNetwork operation center
Network operation centerMapYourTech
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyLiwei Ren任力偉
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issuesommerville-videos
 
ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service ManagementMarvin Sirait
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional RequirementsDavid Simons
 

What's hot (20)

Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)Business continuity & disaster recovery planning (BCP & DRP)
Business continuity & disaster recovery planning (BCP & DRP)
 
Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301Building a strong BC programme with ISO 22301
Building a strong BC programme with ISO 22301
 
Data Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPRData Protection Officer Dashboard | GDPR
Data Protection Officer Dashboard | GDPR
 
3. Security Engineering
3. Security Engineering3. Security Engineering
3. Security Engineering
 
Data Loss Prevention
Data Loss PreventionData Loss Prevention
Data Loss Prevention
 
IT Service Desk Software RFP Template
IT Service Desk Software RFP TemplateIT Service Desk Software RFP Template
IT Service Desk Software RFP Template
 
Telecom Performance Management System: Overview
Telecom Performance Management System: OverviewTelecom Performance Management System: Overview
Telecom Performance Management System: Overview
 
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantraWorkshop incident response n handling-bssn 12 nop 2019-ignmantra
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
 
8. operations security
8. operations security8. operations security
8. operations security
 
IT infrastructure security 101
IT infrastructure security 101IT infrastructure security 101
IT infrastructure security 101
 
Security Event Analysis Through Correlation
Security Event Analysis Through CorrelationSecurity Event Analysis Through Correlation
Security Event Analysis Through Correlation
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
IT Service Level Agreement
IT Service Level AgreementIT Service Level Agreement
IT Service Level Agreement
 
How to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qmsHow to prepare for an audit and maintain oversight within your e qms
How to prepare for an audit and maintain oversight within your e qms
 
Network operation center
Network operation centerNetwork operation center
Network operation center
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Cybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issueCybersecurity 4 security is sociotechnical issue
Cybersecurity 4 security is sociotechnical issue
 
ITIL Service Management
ITIL Service ManagementITIL Service Management
ITIL Service Management
 
Non-Functional Requirements
Non-Functional RequirementsNon-Functional Requirements
Non-Functional Requirements
 

Viewers also liked

WBS Structure –Essential Element In Project Management
WBS Structure –Essential Element In Project ManagementWBS Structure –Essential Element In Project Management
WBS Structure –Essential Element In Project ManagementAnjali Rao
 
Information security
Information securityInformation security
Information securityLJ PROJECTS
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information SecurityDr. Loganathan R
 
Program evaluation review technique (pert)
Program evaluation review technique (pert)Program evaluation review technique (pert)
Program evaluation review technique (pert)tomeh
 
The gantt Chart
The gantt Chart The gantt Chart
The gantt Chart Nicola2903
 
Program Evaluation and Review Technique (PERT)
Program Evaluation and Review Technique (PERT)Program Evaluation and Review Technique (PERT)
Program Evaluation and Review Technique (PERT)Abhishek Pachisia
 
WBS presentation
WBS presentationWBS presentation
WBS presentationjpstewar
 
Network Problem CPM & PERT
Network Problem CPM &  PERTNetwork Problem CPM &  PERT
Network Problem CPM & PERTPulchowk Campus
 
Work breakdown structure ppt
Work breakdown structure pptWork breakdown structure ppt
Work breakdown structure pptnazi2020
 

Viewers also liked (14)

Gantt
GanttGantt
Gantt
 
Gantt chart
Gantt chartGantt chart
Gantt chart
 
WBS Structure –Essential Element In Project Management
WBS Structure –Essential Element In Project ManagementWBS Structure –Essential Element In Project Management
WBS Structure –Essential Element In Project Management
 
Work breakdown structure
Work breakdown structureWork breakdown structure
Work breakdown structure
 
Information security
Information securityInformation security
Information security
 
Introduction to Information Security
Introduction to Information SecurityIntroduction to Information Security
Introduction to Information Security
 
Program evaluation review technique (pert)
Program evaluation review technique (pert)Program evaluation review technique (pert)
Program evaluation review technique (pert)
 
The gantt Chart
The gantt Chart The gantt Chart
The gantt Chart
 
Gantt Charts
Gantt ChartsGantt Charts
Gantt Charts
 
Pert
PertPert
Pert
 
Program Evaluation and Review Technique (PERT)
Program Evaluation and Review Technique (PERT)Program Evaluation and Review Technique (PERT)
Program Evaluation and Review Technique (PERT)
 
WBS presentation
WBS presentationWBS presentation
WBS presentation
 
Network Problem CPM & PERT
Network Problem CPM &  PERTNetwork Problem CPM &  PERT
Network Problem CPM & PERT
 
Work breakdown structure ppt
Work breakdown structure pptWork breakdown structure ppt
Work breakdown structure ppt
 

Similar to Security Project Management Training

Basics in Project Management
Basics in Project ManagementBasics in Project Management
Basics in Project Managementchaitanyakrsk
 
Project Manangement Introduction
Project Manangement IntroductionProject Manangement Introduction
Project Manangement Introductionasim78
 
Intro to PM.pdf
Intro to PM.pdfIntro to PM.pdf
Intro to PM.pdfDaveNjoga1
 
10 me667 chap1 project management
10 me667 chap1 project management10 me667 chap1 project management
10 me667 chap1 project managementPavan Kumar
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01samansari22
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01petch phanpha
 
projectmanagement-130721095616-phpapp01-converted.pptx
projectmanagement-130721095616-phpapp01-converted.pptxprojectmanagement-130721095616-phpapp01-converted.pptx
projectmanagement-130721095616-phpapp01-converted.pptxChandrasen Sharma
 
2.requirements management
2.requirements management2.requirements management
2.requirements managementPanos Fitsilis
 
Towards a hybrid approach between agile and traditional methods
Towards a hybrid approach between agile and traditional methodsTowards a hybrid approach between agile and traditional methods
Towards a hybrid approach between agile and traditional methodsRachid Meziani, PhD, CGEIT, PMP
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project ManagementAbbas Ali
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01samansari22
 

Similar to Security Project Management Training (20)

Basics in Project Management
Basics in Project ManagementBasics in Project Management
Basics in Project Management
 
define phase.pptx
define phase.pptxdefine phase.pptx
define phase.pptx
 
Project Manangement Introduction
Project Manangement IntroductionProject Manangement Introduction
Project Manangement Introduction
 
Intro to PM.pdf
Intro to PM.pdfIntro to PM.pdf
Intro to PM.pdf
 
Proj mgmt and scm
Proj mgmt and scmProj mgmt and scm
Proj mgmt and scm
 
10 me667 chap1 project management
10 me667 chap1 project management10 me667 chap1 project management
10 me667 chap1 project management
 
1 project management framework
1  project management framework1  project management framework
1 project management framework
 
Project Planning & Feasibility Study
Project Planning & Feasibility StudyProject Planning & Feasibility Study
Project Planning & Feasibility Study
 
Project management
Project managementProject management
Project management
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01
 
Session 1 PMP 4th edition
Session 1 PMP 4th editionSession 1 PMP 4th edition
Session 1 PMP 4th edition
 
PART- 2: Engineering Project Management
PART- 2: Engineering Project Management PART- 2: Engineering Project Management
PART- 2: Engineering Project Management
 
projectmanagement-130721095616-phpapp01-converted.pptx
projectmanagement-130721095616-phpapp01-converted.pptxprojectmanagement-130721095616-phpapp01-converted.pptx
projectmanagement-130721095616-phpapp01-converted.pptx
 
bingsusu.pptx
bingsusu.pptxbingsusu.pptx
bingsusu.pptx
 
2.requirements management
2.requirements management2.requirements management
2.requirements management
 
Towards a hybrid approach between agile and traditional methods
Towards a hybrid approach between agile and traditional methodsTowards a hybrid approach between agile and traditional methods
Towards a hybrid approach between agile and traditional methods
 
Project Mgt.- (Mod)..ppt
Project Mgt.- (Mod)..pptProject Mgt.- (Mod)..ppt
Project Mgt.- (Mod)..ppt
 
Introduction to Project Management
Introduction to Project ManagementIntroduction to Project Management
Introduction to Project Management
 
Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01Projectmanagement 130721095616-phpapp01
Projectmanagement 130721095616-phpapp01
 

Security Project Management Training

  • 1. Project Management Methodology in Security Projects Deter - Detect - Delay - Deny 1 John N. Motlagh, MBA
  • 2. Project management history Project management defined Team dynamics Project management mechanics Project manager qualities Project estimating Contracting Risk assessment Financials Deter - Detect - Delay - Deny 2 Agenda
  • 3. “A project is a temporary endeavor undertaken to create a unique product or service” PMBOK 2001 “Any undertaking that has a definite, final objective representing specified values to be used to satisfy some need or desire”. Cleland Deter - Detect - Delay - Deny 3 Project Defined
  • 4. Project Management is the application of knowledge, skills, tools and techniques to meet project objectives. PMBOK 2001 Deter - Detect - Delay - Deny 4 Project Management Defined
  • 5. Kerzner believes successful project management will yield the following: Projects completed within the allotted time and budget Systems having the desired performance level Assigned resources are used effectively and efficiently Customer acceptance Deter - Detect - Delay - Deny 5 Project Management Defined
  • 6. “A program is a group of projects managed in a coordinated way to obtain benefits not available from managing them separately.” PMBOK 2001 “Operations are ongoing work, similar to programs, with a reduced sense of benefit.” Kerzner Deter - Detect - Delay - Deny 6 Programs and Operation
  • 7. Deter - Detect - Delay - Deny 7 What is the PMBOK?
  • 8. Integration Scope Time Cost Quality Procurement Communication Risk Human Resources Deter - Detect - Delay - Deny 8 PMBOK Knowledge Areas
  • 9. Initiation Planning Execution Control Close Deter - Detect - Delay - Deny 9 PMBOK Process Groups
  • 10. Deter - Detect - Delay - Deny 10 How do Knowledge Areas and Process Groups map?
  • 11. Definitions History Dashboard Deter - Detect - Delay - Deny 11 Project management fundamentals
  • 12. Temporary Limited time frame Definite beginning and end End is when the objectives are met or, It is clear that the objectives cannot be met Unique Something that has not been done before May be unique even if the category it belongs to is large Deter - Detect - Delay - Deny 12 Project management definitions
  • 13. Developing a new fighter jet Bringing a new drug to market Installing a security system Programming a DVR Deter - Detect - Delay - Deny 13 Project definitions
  • 14. Time Processes required to ensure timely completion of the project Cost Processes required to ensure the project is completed within budget Quality Includes all the process required to ensure the project will satisfy the needs for which it was undertaken Deter - Detect - Delay - Deny 14 Project definitions
  • 15. Activity definition Activity sequencing Activity duration estimating Schedule development Schedule control Deter - Detect - Delay - Deny 15 Time
  • 16. Resource planning Cost estimating Cost budgeting Cost control Deter - Detect - Delay - Deny 16 Cost
  • 17. Quality planning Quality assurance Quality control Deter - Detect - Delay - Deny 17 Quality
  • 18. Project manager Management team Subcontractors Sales team Consultants Customers Deter - Detect - Delay - Deny 18 Stakeholders
  • 19. An MS Project gantt chart is not a WBS Base line planning document If it is not in the WBS it is not in scope Deter - Detect - Delay - Deny 19 Work breakdown structure
  • 20. Time oriented display of activity Activity along the left Calendar along the top Duration represented by bars Deter - Detect - Delay - Deny 20 Gantt or Bar chart
  • 21. Critical path method (CPM) Used to predict project duration Analyze the activities with the least amount of scheduling flexibility Late start Early finish Deter - Detect - Delay - Deny 21 Network diagram
  • 22. PERT Statistical estimating Optimistic Most likely Pessimistic Deter - Detect - Delay - Deny 22
  • 23. No shortage of literature on team dynamics The Joiner Team Handbook is the best there out there Deter - Detect - Delay - Deny 23 Managing the project team
  • 24. Team building stages Forming Feelings Behaviors Storming Norming Performing Recipe for a successful team Clear goals Continuous improvement Clear roles Clear communication Beneficial team behaviors Well defined decision process Established ground rules Awareness of group process Use scientific approach Deter - Detect - Delay - Deny 24 Highlights from the Team Handbook
  • 25. Deter - Detect - Delay - Deny 25 Break?
  • 26. Late 1800’s Faced with large projects Unprecedented amounts of raw materials Managing 1000’s of laborers Transcontinental railroad Deter - Detect - Delay - Deny 26 Project management history
  • 27. Early 1900’s Demand for harder and longer hours from workers force science of efficiency WWI, New deal projects Gantt chart developed around 1900 PM unchanged for almost 100 years Deter - Detect - Delay - Deny 27 Project management history
  • 28. Late 1900’s WWII Shrinking war time labor New organization Pert chart Critical Path Methodology (CPM) Highly complex projects for military, industrial, construction Deter - Detect - Delay - Deny 28 Project management history
  • 29. Today Internet based systems Global resources working in real time Deter - Detect - Delay - Deny 29 Project management history
  • 30. Pre-sales Defining phase Planning phase Implementation phase Closing phase Deter - Detect - Delay - Deny 30 Phase breakdown
  • 31. Divided into unique phases, starts after sales cycle is complete Deter - Detect - Delay - Deny 31 Security specific project management Defining Planning Closing Implementing
  • 32.
  • 36.
  • 39.
  • 45.
  • 46.
  • 48.
  • 50.
  • 51. Manage design process Manage costs Balance activities Ensure customer satisfaction Project scope Project costs Project schedule Not price Deter - Detect - Delay - Deny 35 Responsibilities
  • 52. Understand and interpret the scope of work to the project team Continually validate scope with customers Continually search for ways to reduce costs Plan project phases and tasks Manage cash flow Coordinate sub-contractors Communicate to the stakeholders Deter - Detect - Delay - Deny 36 Tactical tasks
  • 53. Project leader Administrator Coordinator Politician Advocate for the firm and the customer ? Deter - Detect - Delay - Deny 37 Qualities of a Project Manager
  • 54. The project manager is responsible for Project definition Project planning Project implementation Project closing The PM must make sure the project is On time Within budget Within scope, and Meets customer expectations Deter - Detect - Delay - Deny 38 Project manager summary
  • 55. Security equipment specifications Tools and techniques Risks associated with estimating Inputs to an accurate estimate Deter - Detect - Delay - Deny 39 Estimate security projects
  • 56. Removed from electric subsystem Now they are considered under Division 28 Deter - Detect - Delay - Deny 40 Specifications
  • 57. Order of magnitude Expert judgment -25% to +75% Parametric modeling Cost /sq ft, budgetary -10% to +25% Bottom up Cost of individual items -5% to +10% Unit price -5% to +5% Deter - Detect - Delay - Deny 41 Cost estimating techniques
  • 58. Scope Loosely defined scope No specs Poor requirements Time Rushed timeline Unanticipated overtime Quality Customer asks for work beyond scope without change order Other Legislative requirements Might change during project Deter - Detect - Delay - Deny 42 What can affect your estimates?
  • 59. “Make it up on the next job” Poor scope interpretation Inaccurate WBS Rework Optimistic schedule ? Deter - Detect - Delay - Deny 43 Estimating risks
  • 60. Work breakdown structure Resource requirements Resource rates Activity durations Historical information Deter - Detect - Delay - Deny 44 Estimating inputs
  • 61. List resources required for each WBS item Need resource quantity Need resource cost Resource types Equipment Labor Subs Special tools Deter - Detect - Delay - Deny 45 Resource requirements
  • 62. Unit price for each resource Consider using burdened labor rate Deter - Detect - Delay - Deny 46 Resource rates
  • 63. Use standard labor for installation NECA manual Man hours 16 man hours = 2 techs for 1 day Deter - Detect - Delay - Deny 47 Activity duration
  • 64. How much did this cost in the past? Use it as a check rather than lead estimating tool Deter - Detect - Delay - Deny 48 Historical information
  • 65. General conditions Bid bond Performance bond Insurance Workman’s comp Permits Performance Contract types RFP Fixed price Cost re-imbursement Time and materials Deter - Detect - Delay - Deny 49 Contracting
  • 66. First step to manage security risks Evaluate the likelihood that a threat will be successful, and then considers The potential severity of if the event comes to pass The objective is to identify Hazards Threats and vulnerabilities Deter - Detect - Delay - Deny 50 Security vulnerability assessment
  • 67. Evaluate countermeasures to provide protection to the Public Employees National interests Environment Countermeasures come in the form of CCTV Intrusion detection Access control Barrier technology Lighting Policy Deter - Detect - Delay - Deny 51 What does a firm do with the results?
  • 68. Risk Deter - Detect - Delay - Deny 52 SVA Concepts
  • 69. Risk variables Deter - Detect - Delay - Deny 53 SVA Concepts
  • 70. Deter - Detect - Delay - Deny 54 SVA Process
  • 71. Deter - Detect - Delay - Deny 55 Risk assessment steps Asset characterization Threat Assessment Vulnerability Analysis Risk Assessment Countermeasures Analysis
  • 72. NFPA 101 (National Fire Protection Association) Highlights AHJ Fire exit hardware (exit doors should get your full and undivided attention) Means of egress (NFPA chapter 7, IBC ch. 10) Area of refuge Deter - Detect - Delay - Deny 56 Life safety codes
  • 73. NFPA – 70 National electric code NFPA – 72 National fire alarm code NFPA – Standard for emergency and safety power systems NFPA – 730 Premise security UL924 – Standard for safety emergency lighting and power UL325 – Gate operators ASTM F-1184 and F-2200 – posts and gates Deter - Detect - Delay - Deny 57 Other governing codes
  • 74. Markup vs. margin Earned value Change order Deter - Detect - Delay - Deny 58 Project financial management
  • 75. Markup vs. Margin Markup is cost plus a % Don’t use it Margin is preferred Deter - Detect - Delay - Deny 59
  • 76. Comparison of Budgeted value of work (Planned value, PV) Earned value, function of Percentage complete and Planned value Actual cost Deter - Detect - Delay - Deny 60 Earned value measurement
  • 77. Cost variance Measurement according to budgeted amount in terms of Dollar amount over/under % of budget over/under Schedule variance Measurement according to scheduled activity in terms of Time over/under schedule % of time over under Deter - Detect - Delay - Deny 61 Earned value measurement
  • 78. Cost performance index Less than 1 means over budget Greater than or equal to 1 is on budget Schedule performance index Less than 1 means behind schedule Greater than or equal to 1 is on schedule Deter - Detect - Delay - Deny 62 Earned value measurement
  • 79. Deter - Detect - Delay - Deny 63 Had enough?